CVE-2007-1043 – Ezboo Webstats 3.03 - Administrative Authentication Bypass
https://notcve.org/view.php?id=CVE-2007-1043
Ezboo webstats, possibly 3.0.3, allows remote attackers to bypass authentication and gain access via a direct request to (1) update.php and (2) config.php. Ezboo webstats, posiblemente la 3.0.3, permite a atacantes remotos evitar la autenticación y obtener una vía de acceso mediante una petición directa al (1) update.php y (2) config.php. • https://www.exploit-db.com/exploits/29610 http://forums.avenir-geopolitique.net/viewtopic.php?t=2674 http://osvdb.org/34181 http://securityreason.com/securityalert/2275 http://www.securityfocus.com/archive/1/460325/100/0/threaded http://www.securityfocus.com/bid/22590 https://exchange.xforce.ibmcloud.com/vulnerabilities/32563 •
CVE-2007-0646 – Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String
https://notcve.org/view.php?id=CVE-2007-0646
Format string vulnerability in iMovie HD 6.0.3, and Safari in Apple Mac OS X 10.4 through 10.4.10, allows remote user-assisted attackers to cause a denial of service (crash) via format string specifiers in a filename, which is not properly handled when calling the NSRunCriticalAlertPanel Apple AppKit function. Una vulnerabilidad de cadena de formato en iMovie HD versión 6.0.3 y Safari en Apple Mac OS X versiones 10.4 hasta 10.4.10, permite a atacantes remotos asistidos por el usuario causar una denegación de servicio (bloqueo de aplicación) por medio de los especificadores de cadena de formato en un nombre de archivo, que no es manejado apropiadamente cuando llaman a la función NSRunCriticalAlertPanel de Apple AppKit. • https://www.exploit-db.com/exploits/29551 http://docs.info.apple.com/article.html?artnum=305391 http://docs.info.apple.com/article.html?artnum=307041 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://secunia.com/advisories/24966 http://secunia.com/advisories/27643 http://www.digitalmunition.com/MOAB-30-01-2007.html http://www.securityfocus.com/bid/22326 http://www.securityfocus • CWE-134: Use of Externally-Controlled Format String •
CVE-2007-0614 – Apple iChat Bonjour 3.1.6.441 - Multiple Denial of Service Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-0614
The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428 in Apple Mac OS X 10.4.8 allows remote attackers to cause a denial of service (persistent application crash) via a crafted phsh hash attribute in a TXT key. La funcionalidad Bonjour en el mDNSResponder, iChat 3.1.6 y InstantMessage framework 428 en Apple Mac OS X 10.4.8 permite a atacantes remotos provocar una denegación de servicio (caída continua de la aplicación) mediante la manipulación del atributo phsh hash en la clave de un TXT. • https://www.exploit-db.com/exploits/3230 http://docs.info.apple.com/article.html?artnum=305102 http://lists.apple.com/archives/Security-announce/2007/Feb/msg00000.html http://projects.info-pull.com/moab/MOAB-29-01-2007.html http://secunia.com/advisories/23945 http://secunia.com/advisories/24198 http://www.osvdb.org/32713 http://www.securityfocus.com/bid/22304 http://www.securitytracker.com/id?1017661 •
CVE-2007-0465 – Apple Installer Package 2.1.5 - Filename Format String
https://notcve.org/view.php?id=CVE-2007-0465
Format string vulnerability in Apple Installer 2.1.5 on Mac OS X 10.4.8 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a (1) PKG, (2) DISTZ, or (3) MPKG package filename. Vulnerabilidad de formato de cadena en Apple Installer 2.1.5 sobre Mac OS X 10.4.8 permite a atacantes con la intervención del usuario ejecutar código de su elección a través de especificaciones del formato de cadena en el nombre de fichero de paquete (1) PKG, (2) DISTZ, o (3) MPKG. • https://www.exploit-db.com/exploits/29532 http://docs.info.apple.com/article.html?artnum=305391 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://projects.info-pull.com/moab/MOAB-26-01-2007.html http://secunia.com/advisories/24966 http://www.osvdb.org/32705 http://www.securityfocus.com/bid/22272 http://www.securitytracker.com/id?1017940 http://www.us-cert.gov/cas/techalerts/TA07-109A.html http://www.vupen.com/english/advisories/2007/14 •
CVE-2007-0588
https://notcve.org/view.php?id=CVE-2007-0588
The InternalUnpackBits function in Apple QuickDraw, as used by Quicktime 7.1.3 and other applications on Mac OS X 10.4.8 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PICT file that triggers memory corruption in the _GetSrcBits32ARGB function. NOTE: this issue might overlap CVE-2007-0462. La función InternalUnpackBits en Apple QuickDraw, como ha sido usado en Quicktime 7.1.3 y otras aplicaciones de Mac OS X 10.4.8 y anteriores, permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código de su elección mediante un fichero PICT artesanal que provoca una corrupción de memoria en la función _GetSrcBits32ARGB. NOTA: este asunto puede estar solapado con CVE-2007-0462. • http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://secunia.com/advisories/24479 http://security-protocols.com/sp-x43-advisory.php http://www.kb.cert.org/vuls/id/396820 http://www.osvdb.org/33365 http://www.securityfocus.com/bid/22228 http://www.securitytracker.com/id?1017760 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.vupen.com/english/advisories/2007/0930 •